default search action
Abdelmadjid Bouabdallah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j70]Mohammad Beyrouti, Ahmed Lounis, Benjamin Lussier, Abdelmadjid Bouabdallah, Abed Ellatif Samhat:
Vulnerability-oriented risk identification framework for IoT risk assessment. Internet Things 27: 101333 (2024) - [c114]Asma Arab, Michaël Mahamat, Ghada Jaber, Abdelmadjid Bouabdallah:
Optimizing Energy Consumption for IoT Adaptive Security: A Mobility-Based Solution. ACR 2024: 280-291 - [c113]Safa Bendaouia, Ahmed Lounis, Abdelmadjid Bouabdallah:
Green, scalable and efficient IoT architecture. FMEC 2024: 237-244 - [c112]Mohammad Beyrouti, Ahmed Lounis, Benjamin Lussier, Abdelmadjid Bouabdallah, Abed Ellatif Samhat:
Security-Bag: A Specification-based Intrusion Detection System Applied to Star Topology BLE Networks. IOTSMS 2024: 169-176 - 2023
- [j69]Mohamed Mohammedi, Mawloud Omar, Abdelmadjid Bouabdallah:
Methods for detecting and removing ocular artifacts from EEG signals in drowsy driving warning systems: A survey. Multim. Tools Appl. 82(12): 17687-17714 (2023) - [j68]Michaël Mahamat, Ghada Jaber, Abdelmadjid Bouabdallah:
Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges. Wirel. Networks 29(2): 787-808 (2023) - [c111]Mohammad Beyrouti, Ahmed Lounis, Benjamin Lussier, Abdelmadjid Bouabdallah, Abed Ellatif Samhat:
Vulnerability and Threat Assessment Framework for Internet of Things Systems. CIoT 2023: 62-69 - [c110]Michaël Mahamat, Ghada Jaber, Abdelmadjid Bouabdallah:
A Threat-Aware and Efficient Wireless Charging Scheme for IoT Networks. IWCMC 2023: 67-73 - [c109]Khaled Abid, Hicham Lakhlef, Abdelmadjid Bouabdallah:
Preventive Time Slot Allocation MAC Protocol for Vehicular Networks. IWCMC 2023: 739-744 - 2022
- [j67]Mohamed Ali Kandi, Djamel Eddine Kouicem, Messaoud Doudou, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. Comput. Commun. 191: 11-25 (2022) - [j66]Sana Benhamaid, Abdelmadjid Bouabdallah, Hicham Lakhlef:
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey. J. Netw. Comput. Appl. 198: 103257 (2022) - [j65]Djamel Eddine Kouicem, Youcef Imine, Abdelmadjid Bouabdallah, Hicham Lakhlef:
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things. IEEE Trans. Dependable Secur. Comput. 19(2): 1292-1306 (2022) - [c108]Khaled Abid, Hicham Lakhlef, Abdelmadjid Bouabdallah:
Machine Learning-Based Communication Collision Prediction and Avoidance for Mobile Networks. AINA (1) 2022: 194-204 - [c107]Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah:
Security Analysis and Evaluation of Optimized Authentication in Named Data Networking. CSA 2022: 287-297 - [c106]Michaël Mahamat, Ghada Jaber, Abdelmadjid Bouabdallah:
A Deep Reinforcement Learning-Based Context-Aware Wireless Mobile Charging Scheme for the Internet of Things. ISCC 2022: 1-6 - [c105]Youssef Sellami, Ghada Jaber, Ahmed Lounis, Hicham Lakhlef, Abdelmadjid Bouabdallah:
A Cooperative Caching Scheme in Fog/Sensor Nodes for CCN. IWCMC 2022: 481-486 - [c104]Sana Benhamaid, Hicham Lakhlef, Abdelmadjid Bouabdallah:
Energy-Efficient and Context-aware Trajectory Planning for Mobile Data Collection in IoT using Deep Reinforcement Learning. SoftCOM 2022: 1-6 - [c103]Hiba Souissi, Michaël Mahamat, Ghada Jaber, Hicham Lakhlef, Abdelmadjid Bouabdallah:
Analyses of Recent Advances on Machine Learning-based Trust Management for Mobile IoT Applications. SoftCOM 2022: 1-6 - 2021
- [j64]Hicham Lakhlef, Abdelmadjid Bouabdallah:
Efficient and lightweight group rekeying protocol for communicating things. Comput. Electr. Eng. 91: 107021 (2021) - [j63]Khaled Abid, Hicham Lakhlef, Abdelmadjid Bouabdallah:
A survey on recent contention-free MAC protocols for static and mobile wireless decentralized networks in IoT. Comput. Networks 201: 108583 (2021) - [j62]Nour El Houda Senoussi, Abdelmalik Bachir, Abdelmadjid Bouabdallah:
On QoS-aware location privacy in mobile networks. Int. J. Inf. Comput. Secur. 15(2/3): 163-182 (2021) - [c102]Sadek Rayan Aktouche, Mohamed Sallak, Abdelmadjid Bouabdallah, Walter Schön:
Towards Reconciling Safety and Security Risk Analysis Processes in Railway Remote Driving. ICSRS 2021: 148-154 - [c101]Moussa Aboubakar, Pierre Roux, Mounir Kellil, Abdelmadjid Bouabdallah:
A novel scheme for congestion notification in IoT low power networks. IM 2021: 932-937 - [c100]Sana Benhamaid, Hicham Lakhlef, Abdelmadjid Bouabdallah:
Towards Energy Efficient Mobile Data Collection In Cluster-based IoT Networks. PerCom Workshops 2021: 340-343 - [c99]Ramy Chemak, Hicham Lakhlef, Abdelmadjid Bouabdallah:
A Decentralized and Reliable Election-based Key Management Protocol for Communicating Things. SoftCOM 2021: 1-6 - 2020
- [j61]Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
An accountable privacy-preserving scheme for public information sharing systems. Comput. Secur. 93: 101786 (2020) - [j60]Hamed Hellaoui, Mouloud Koudil, Abdelmadjid Bouabdallah:
Energy Efficiency in Security of 5G-Based IoT: An End-to-End Adaptive Approach. IEEE Internet Things J. 7(7): 6589-6602 (2020) - [j59]Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah, Malika Bessedik:
Optimized in-network authentication against pollution attacks in software-defined-named data networking. J. Inf. Secur. Appl. 50 (2020) - [j58]Messaoud Doudou, Abdelmadjid Bouabdallah, Véronique Berge-Cherfaoui:
Driver Drowsiness Measurement Technologies: Current Research, Market Solutions, and Challenges. Int. J. Intell. Transp. Syst. Res. 18(2): 297-319 (2020) - [j57]Said Talbi, Abdelmadjid Bouabdallah:
Interest-based trust management scheme for social internet of things. J. Ambient Intell. Humaniz. Comput. 11(3): 1129-1140 (2020) - [j56]Mohamed Ali Kandi, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things. J. Netw. Comput. Appl. 150 (2020) - [c98]Siham Bouchelaghem, Abdelmadjid Bouabdallah, Mawloud Omar:
Autonomous Vehicle Security: Literature Review of Real Attack Experiments. CRiSIS 2020: 255-272 - [c97]Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef:
An Efficient and Anonymous Blockchain-Based Data Sharing Scheme for Vehicular Networks. ISCC 2020: 1-6 - [c96]Hicham Lakhlef, Ghada Jaber, Abdelmadjid Bouabdallah, Fabio D'Andreagiovanni, Ahmed Lounis:
Distributed Time Slots Assignment Protocol in Dynamic Networks. ISCC 2020: 1-6 - [c95]Hicham Lakhlef, Abdelmadjid Bouabdallah, Fabio D'Andreagiovanni:
A Memory-efficient Group Key Managment for Communicating Things. Q2SWinet 2020: 29-35 - [c94]Khaled Abid, Ghada Jaber, Hicham Lakhlef, Ahmed Lounis, Abdelmadjid Bouabdallah:
An Energy Efficient Architecture of self-sustainable WSN based on Energy Harvesting and Wireless Charging with Consideration of Deployment Cost. Q2SWinet 2020: 109-114 - [c93]Moussa Aboubakar, Pierre Roux, Mounir Kellil, Abdelmadjid Bouabdallah:
An Efficient and Adaptive Configuration of IEEE 802.15.4 MAC for Communication Delay Optimisation. NOF 2020: 1-7 - [c92]Moussa Aboubakar, Mounir Kellil, Abdelmadjid Bouabdallah, Pierre Roux:
Using Machine Learning to Estimate the Optimal Transmission Range for RPL Networks. NOMS 2020: 1-5 - [c91]Mohamed Ali Kandi, Djamel Eddine Kouicem, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things. TrustCom 2020: 1868-1873
2010 – 2019
- 2019
- [c90]Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah:
Single-Path Network Coding Authentication for Software-Defined Named Data Networking. AICCSA 2019: 1-8 - [c89]Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
An Efficient Accountable Privacy-Preserving Scheme for Public Information Sharing in Fog Computing. GLOBECOM 2019: 1-6 - [c88]Mohamed Ali Kandi, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
A Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things. GLOBECOM 2019: 1-6 - [c87]Mohamed Mohammedi, Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Cryptanalysis and Improvement of Identity-Based Multisignature Scheme. ICFNDS 2019: 19:1-19:5 - [c86]Hicham Lakhlef, Youcef Imine, Abdelmadjid Bouabdallah:
A Distributed Collision-free Distance-2 Coloring Algorithm for Ring Networks. SoftCOM 2019: 1-6 - [c85]Mohamed Ali Kandi, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
An Efficient Multi-Group Key Management Protocol for Heterogeneous IoT Devices. WCNC 2019: 1-6 - [c84]Moussa Aboubakar, Mounir Kellil, Abdelmadjid Bouabdallah, Pierre Roux:
Toward Intelligent Reconfiguration of RPL Networks using Supervised Learning. Wireless Days 2019: 1-4 - 2018
- [j55]Mourad Benmalek, Yacine Challal, Abdelouahid Derhab, Abdelmadjid Bouabdallah:
VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems. Comput. Networks 132: 161-179 (2018) - [j54]Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef:
Internet of things security: A top-down survey. Comput. Networks 141: 199-221 (2018) - [j53]Hicham Lakhlef, Abdelmadjid Bouabdallah, Michel Raynal, Julien Bourgeois:
Agent-based broadcast protocols for wireless heterogeneous node networks. Comput. Commun. 115: 51-63 (2018) - [j52]Nawel Yessad, Mawloud Omar, Abdelkamel Tari, Abdelmadjid Bouabdallah:
QoS-based routing in Wireless Body Area Networks: a survey and taxonomy. Computing 100(3): 245-275 (2018) - [j51]Mohamed Mohammedi, Mawloud Omar, Abdelmadjid Bouabdallah:
Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments. J. Ambient Intell. Humaniz. Comput. 9(5): 1527-1539 (2018) - [j50]Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
Revocable attribute-based access control in mutli-autority systems. J. Netw. Comput. Appl. 122: 61-76 (2018) - [c83]Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah, Djelloul Ighit, Lyes Tairi:
Peer-to-Peer Collaborative Video-on-Demand Streaming over Mobile Content Centric Networking. AINA 2018: 1053-1059 - [c82]Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah:
Authenticated Network Coding for Software-Defined Named Data Networking. AINA 2018: 1115-1122 - [c81]Nour El Houda Senoussi, Mohamed Lamine Kerdoudi, Abdelmalik Bachir, Abdelmadjid Bouabdallah:
On Enhancing Location Privacy and QoS for Video Streaming Over Wireless Networks. GLOBECOM 2018: 1-6 - [c80]Messaoud Doudou, Abdelmadjid Bouabdallah:
Performance Specifications of Market Physiological Sensors for Efficient Driver Drowsiness Detection System. SENSORNETS 2018: 99-106 - [c79]Mohamed Ali Kandi, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal:
An Efficient Multi-Group Key Management Protocol for Internet of Things. SoftCOM 2018: 1-6 - [c78]Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef:
An Efficient Architecture for Trust Management in IoE Based Systems of Systems. SoSE 2018: 138-143 - [c77]Youcef Imine, Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Ahmed Lounis:
MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing Architecture. TrustCom/BigDataSE 2018: 608-613 - 2017
- [j49]Hamed Hellaoui, Mouloud Koudil, Abdelmadjid Bouabdallah:
Energy-efficient mechanisms in security of the internet of things: A survey. Comput. Networks 127: 173-189 (2017) - [j48]Djoudi Touazi, Mawloud Omar, Abdelhakim Bendib, Abdelmadjid Bouabdallah:
A trust-based approach for securing data communication in delay tolerant networks. Int. J. Inf. Comput. Secur. 9(4): 324-336 (2017) - [j47]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal, Frédéric Marin:
A survey of energy-efficient context recognition systems using wearable sensors for healthcare applications. Pervasive Mob. Comput. 37: 23-44 (2017) - [j46]Said Talbi, Mouloud Koudil, Abdelmadjid Bouabdallah, Karima Benatchba:
Adaptive and dual data-communication trust scheme for clustered wireless sensor networks. Telecommun. Syst. 65(4): 605-619 (2017) - [c76]Abdelmadjid Bouabdallah, Hicham Lakhlef, Michel Raynal, François Taïani:
Providing Collision-Free and Conflict-Free Communication in General Synchronous Broadcast/Receive Networks. AINA 2017: 399-406 - [c75]Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef:
Distributed Fine-Grained Secure Control of Smart Actuators in Internet of Things. ISPA/IUCC 2017: 653-660 - [c74]Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
ABR: A new efficient attribute based revocation on access control system. IWCMC 2017: 735-740 - [c73]Ryma Boussaha, Yacine Challal, Malika Bessedik, Abdelmadjid Bouabdallah:
Towards authenticated network coding for named data networking. SoftCOM 2017: 1-6 - [c72]Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control. TrustCom/BigDataSE/ICESS 2017: 33-40 - 2016
- [j45]Mawloud Omar, Souraya Yahiaoui, Abdelmadjid Bouabdallah:
Reliable and energy aware query-driven routing protocol for wireless sensor networks. Ann. des Télécommunications 71(1-2): 73-85 (2016) - [j44]Amira Barki, Abdelmadjid Bouabdallah, Said Gharout, Jacques Traoré:
M2M Security: Challenges and Solutions. IEEE Commun. Surv. Tutorials 18(2): 1241-1254 (2016) - [j43]Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal:
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Future Gener. Comput. Syst. 55: 266-277 (2016) - [j42]Farah-Sarah Ouada, Mawloud Omar, Abdelmadjid Bouabdallah, Abdelkamel Tari:
Lightweight identity-based authentication protocol for wireless sensor networks. Int. J. Inf. Comput. Secur. 8(2): 121-138 (2016) - [j41]Messaoud Doudou, José M. Barceló-Ordinas, Djamel Djenouri, Jorge García-Vidal, Abdelmadjid Bouabdallah, Nadjib Badache:
Game Theory Framework for MAC Parameter Optimization in Energy-Delay Constrained Sensor Networks. ACM Trans. Sens. Networks 12(2): 10:1-10:35 (2016) - [j40]Feriel Bouakkaz, Mawloud Omar, Souad Laib, Lilia Guermouz, Abdelkamel Tari, Abdelmadjid Bouabdallah:
Lightweight Sharing Scheme for Data Integrity Protection in WSNs. Wirel. Pers. Commun. 89(1): 211-226 (2016) - [c71]Asma Boudrioua, Souraya Yahiaoui, Mawloud Omar, Abdelmadjid Bouabdallah:
EREAT: Efficient Route Estimation based-on Actuator Tracking for WSANs. BDAW 2016: 27:1-27:5 - [c70]Hamed Hellaoui, Abdelmadjid Bouabdallah, Mouloud Koudil:
TAS-IoT: Trust-Based Adaptive Security in the IoT. LCN 2016: 599-602 - [c69]Messaoud Doudou, Tifenn Rault, Abdelmadjid Bouabdallah:
Efficient QoS-aware heterogeneous architecture for energy-delay constrained connected objects. WMNC 2016: 9-16 - 2015
- [j39]Abdelmalik Bachir, Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah:
Joint Connectivity-Coverage Temperature-Aware Algorithms for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 26(7): 1923-1936 (2015) - [c68]Mourad Benmalek, Yacine Challal, Abdelmadjid Bouabdallah:
Scalable Multi-group Key Management for Advanced Metering Infrastructure. CIT/IUCC/DASC/PICom 2015: 183-190 - [c67]Said Talbi, Mouloud Koudil, Abdelmadjid Bouabdallah, Karima Benatchba:
Adaptive Data-Communication Trust Mechanism for Clustered Wireless Sensor Networks. GLOBECOM 2015: 1-6 - [c66]Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah:
Towards Integrating Trusted Execution Environment into Embedded Autonomic Systems. ICAC 2015: 165-166 - [c65]Walid Bechkit, Yacine Challal, Abdelmalik Bachir, Abdelmadjid Bouabdallah:
Temperature MAC plug-in for large scale WSN. ICC 2015: 6389-6394 - [c64]Lotfi Zaouche, Enrico Natalizio, Abdelmadjid Bouabdallah:
ETTAF: Efficient Target Tracking and Filming with a Flying Ad Hoc Network. SmartObjects@MobiCom 2015: 49-54 - [c63]Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah:
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation. SEC 2015: 557-570 - [c62]Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah:
Trusted Execution Environment: What It is, and What It is Not. TrustCom/BigDataSE/ISPA (1) 2015: 57-64 - [i1]Jie Ding, Abdelmadjid Bouabdallah, Vahid Tarokh:
Key Pre-Distributions From Graph-Based Block Designs. CoRR abs/1506.07466 (2015) - 2014
- [j38]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal:
Energy efficiency in wireless sensor networks: A top-down survey. Comput. Networks 67: 104-122 (2014) - [j37]Marion Souil, Abdelmadjid Bouabdallah, Ahmed E. Kamal:
Efficient QoS provisioning at the MAC layer in heterogeneous wireless sensor networks. Comput. Commun. 43: 16-30 (2014) - [j36]Messaoud Doudou, Djamel Djenouri, Nadjib Badache, Abdelmadjid Bouabdallah:
Synchronous contention-based MAC protocols for delay-sensitive wireless sensor networks: A review and taxonomy. J. Netw. Comput. Appl. 38: 172-184 (2014) - [c61]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal, Frédéric Marin:
Context-aware energy-efficient wireless sensor architecture for body activity recognition. PerCom Workshops 2014: 203-206 - [c60]Lyes Khelladi, Djamel Djenouri, Noureddine Lasla, Nadjib Badache, Abdelmadjid Bouabdallah:
MSR: Minimum-Stop Recharging Scheme for Wireless Rechargeable Sensor Networks. UIC/ATC/ScalCom 2014: 378-383 - [c59]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal, Frédéric Marin:
Energy-efficient architecture for wearable sensor networks. Wireless Days 2014: 1-8 - 2013
- [j35]Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah:
A new class of Hash-Chain based key pre-distribution schemes for WSN. Comput. Commun. 36(3): 243-255 (2013) - [j34]Abdelmalik Bachir, Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah:
Temperature-Aware Density Optimization for Low Power Wireless Sensor Networks. IEEE Commun. Lett. 17(2): 325-328 (2013) - [j33]Abdelkrim Hadjidj, Marion Souil, Abdelmadjid Bouabdallah, Yacine Challal, Henry L. Owen:
Wireless sensor networks for rehabilitation applications: Challenges and opportunities. J. Netw. Comput. Appl. 36(1): 1-15 (2013) - [j32]Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, Vahid Tarokh:
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 12(2): 948-959 (2013) - [c58]Mohamed Amine Kafi, Yacine Challal, Djamel Djenouri, Messaoud Doudou, Abdelmadjid Bouabdallah, Nadjib Badache:
A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures. ANT/SEIT 2013: 617-626 - [c57]Azeddine Attir, Yacine Challal, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah:
Braided Disjoint Branch Routing Protocol for WSNs. BWCCA 2013: 106-113 - [c56]Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal:
Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management. BWCCA 2013: 248-252 - [c55]Arbia Riahi, Yacine Challal, Enrico Natalizio, Zied Chtourou, Abdelmadjid Bouabdallah:
A Systemic Approach for IoT Security. DCOSS 2013: 351-355 - [c54]Nourhene Maalel, Enrico Natalizio, Abdelmadjid Bouabdallah, Pierre Roux, Mounir Kellil:
Reliability for Emergency Applications in Internet of Things. DCOSS 2013: 361-366 - [c53]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal:
WSN lifetime optimization through controlled sink mobility and packet buffering. GIIS 2013: 1-6 - [c52]Tifenn Rault, Abdelmadjid Bouabdallah, Yacine Challal:
Multi-hop wireless charging optimization in low-power networks. GLOBECOM 2013: 462-467 - 2012
- [j31]H. Ragab Hassen, Hatem Bettahar, Abdelmadjid Bouabdallah, Yacine Challal:
An efficient key management scheme for content access control for linear hierarchies. Comput. Networks 56(8): 2107-2118 (2012) - [j30]Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy. J. Netw. Comput. Appl. 35(1): 268-286 (2012) - [j29]Said Gharout, Abdelmadjid Bouabdallah, Yacine Challal, Mohammed Achemlal:
Adaptive Group Key Management Protocol for Wireless Communications. J. Univers. Comput. Sci. 18(6): 874-898 (2012) - [c51]Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah:
A New Scalable Key Pre-Distribution Scheme for WSN. ICCCN 2012: 1-7 - [c50]Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal:
Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks. ICCCN 2012: 1-7 - [c49]Walid Bechkit, Mouloud Koudil, Yacine Challal, Abdelmadjid Bouabdallah, Brahim Souici, Karima Benatchba:
A new weighted shortest path tree for convergecast traffic routing in WSN. ISCC 2012: 187-192 - [c48]Marion Souil, Tifenn Rault, Abdelmadjid Bouabdallah:
A new adaptive MAC protocol with QoS support for heterogeneous wireless sensor networks. ISCC 2012: 405-410 - [c47]Messaoud Doudou, Djamel Djenouri, Nadjib Badache, Abdelmadjid Bouabdallah:
Slotted contention-based energy-efficient MAC protocols in delay-sensitive wireless sensor networks. ISCC 2012: 419-422 - [c46]Joseph Benin, Julien Poumailloux, Henry L. Owen, Abdelmadjid Bouabdallah:
Impact of pseudonym subsequent pre-computation and forwarding in hybrid vehicular networks. VANET@MOBICOM 2012: 123-126 - [c45]Nourhene Maalel, Mounir Kellil, Pierre Roux, Abdelmadjid Bouabdallah:
Fast Restoration of Connectivity for Wireless Sensor Networks. NEW2AN 2012: 401-412 - [c44]Mohamed Amine Kafi, Yacine Challal, Djamel Djenouri, Abdelmadjid Bouabdallah, Lyes Khelladi, Nadjib Badache:
A study of Wireless Sensor Network Architectures and Projects for Traffic Light Monitoring. ANT/MobiWIS 2012: 543-552 - 2011
- [j28]Mothanna Alkubeily, Hatem Bettahar, Abdelmadjid Bouabdallah:
A new Application-Level Multicast technique for stable, robust and efficient overlay tree construction. Comput. Networks 55(15): 3332-3350 (2011) - [c43]Marion Souil, Abdelmadjid Bouabdallah:
On QoS Provisioning in Context-Aware Wireless Sensor Networks for Healthcare. ICCCN 2011: 1-6 - [c42]Abdelkrim Hadjidj, Yacine Challal, Abdelmadjid Bouabdallah:
Toward a high-fidelity wireless sensor network for rehabilitation supervision. LCN 2011: 458-465 - [c41]Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal:
Rehabilitation supervision using wireless sensor networks. WOWMOM 2011: 1-3 - 2010
- [j27]Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal:
A new worm propagation threat in BitTorrent: modeling and analysis. Telecommun. Syst. 45(2-3): 95-109 (2010) - [c40]Walid Bechkit, Abdelmadjid Bouabdallah, Yacine Challal:
Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining. CCS 2010: 642-644 - [c39]Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabdallah:
BiTIT: Throttling BitTorrent illegal traffic. ISCC 2010: 708-713 - [c38]Sylvie Laniepce, L. Lancieri, Mohammed Achemlal, Abdelmadjid Bouabdallah:
A cross-layer reputation system for routing non-cooperation effects mitigation within hybrid ad-hoc networks. IWCMC 2010: 296-300 - [c37]Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, Ahlem Bencheikh:
An efficient and highly resilient key management scheme for wireless sensor networks. LCN 2010: 216-219 - [c36]Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal:
HDMRP: An Efficient Fault-Tolerant Multipath Routing Protocol for Heterogeneous Wireless Sensor Networks. QSHINE 2010: 469-482 - [c35]Said Gharout, Abdelmadjid Bouabdallah, Mounir Kellil, Yacine Challal:
Key management with host mobility in dynamic groups. SIN 2010: 186-194
2000 – 2009
- 2009
- [j26]Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Reliable and fully distributed trust model for mobile ad hoc networks. Comput. Secur. 28(3-4): 199-214 (2009) - [j25]Hatem Bettahar, Mothanna Alkubeily, Abdelmadjid Bouabdallah:
TKS: a transition key management scheme for secure application level multicast. Int. J. Secur. Networks 4(4): 210-222 (2009) - [j24]Mahdi Amine Abdelouahab, Abdelmadjid Bouabdallah, Mohammed Achemlal, Sylvie Laniepce:
The Topology Change Attack: Threat and Impact. J. Univers. Comput. Sci. 15(2): 465-487 (2009) - [c34]Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabdallah:
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment. PDP 2009: 293-300 - 2008
- [j23]Lyes Khelladi, Yacine Challal, Abdelmadjid Bouabdallah, Nadjib Badache:
On security issues in embedded systems: challenges and solutions. Int. J. Inf. Comput. Secur. 2(2): 140-174 (2008) - [j22]Said Gharout, Yacine Challal, Abdelmadjid Bouabdallah:
Scalable Delay-constrained Multicast Group Key Management. Int. J. Netw. Secur. 7(2): 160-174 (2008) - [j21]Yacine Challal, Said Gharout, Abdelmadjid Bouabdallah, Hatem Bettahar:
Adaptive clustering for scalable key management in dynamic group communications. Int. J. Secur. Networks 3(2): 133-146 (2008) - [c33]Mothanna Alkubeily, Hatem Bettahar, Abdelmadjid Bouabdallah:
Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions. IAS 2008: 141-146 - [c32]Boushra Maala, Yacine Challal, Abdelmadjid Bouabdallah:
HERO: Hierarchical kEy management pRotocol for heterOgeneous wireless sensor networks. WSAN 2008: 125-136 - [c31]Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal:
A new worm propagation threat in BitTorrent: Modeling and analysis. IMCSIT 2008: 791-798 - 2007
- [j20]H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal:
Key management for content access control in a hierarchy. Comput. Networks 51(11): 3197-3219 (2007) - [c30]H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar:
A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies. AINA Workshops (1) 2007: 551-556 - [c29]Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography. SecureComm 2007: 2-10 - 2006
- [c28]Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelmadjid Bouabdallah:
Mobile Multicast Route Optimisation. ICC 2006: 1977-1983 - [c27]Imed Romdhani, Hatem Bettahar, Abdelmadjid Bouabdallah:
Transparent Handover for Mobile Multicast Sources. ICN/ICONS/MCL 2006: 145 - [c26]Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelmadjid Bouabdallah:
Hierarchical Home Agent Architecture for Mobile IP Communications. ISCC 2006: 136-141 - [c25]Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah:
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks. ISCC 2006: 662-667 - [c24]Yoann Hinard, Hatem Bettahar, Yacine Challal, Abdelmadjid Bouabdallah:
AAA based security architecture for multicast content distribution. ISCN 2006: 85-90 - [c23]Abdelaziz Babakhouya, Yacine Challal, Abdelmadjid Bouabdallah, Said Gharout:
S-DV: A new approach to Secure Distance Vector routing protocols. SecureComm 2006: 1-10 - [c22]Imed Romdhani, Jose Munoz, Hatem Bettahar, Abdelmadjid Bouabdallah:
Adaptive Multicast Membership Management for Mobile Multicast Receivers. WiMob 2006: 189-195 - 2005
- [j19]Yacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard:
RLH: receiver driven layered hash-chaining for multicast data origin authentication. Comput. Commun. 28(7): 726-740 (2005) - [j18]Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar:
H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming. Comput. Secur. 24(1): 57-68 (2005) - [j17]Mounir Kellil, Imed Romdhani, Hong-Yon Lach, Abdelmadjid Bouabdallah, Hatem Bettahar:
Multicast receiver and sender access control and its applicability to mobile IP environments: A survey. IEEE Commun. Surv. Tutorials 7(1-4): 46-70 (2005) - [j16]Wei Shi, Abdelmadjid Bouabdallah, Pradip K. Srimani:
Leader election in oriented star graphs. Networks 45(3): 169-179 (2005) - [c21]H. Ragab Hassan, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal:
An Efficient Key Management Algorithm for Hierarchical Group Communication. SecureComm 2005: 270-276 - [c20]Abdelouahid Derhab, Nadjib Badache, Abdelmadjid Bouabdallah:
A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks. WONS 2005: 236-245 - 2004
- [j15]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
SAKM: a scalable and adaptive key management approach for multicast communications. Comput. Commun. Rev. 34(2): 55-70 (2004) - [j14]Imed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdelmadjid Bouabdallah, Hatem Bettahar:
IP Mobile multicast: Challenges and solutions. IEEE Commun. Surv. Tutorials 6(1-4): 18-41 (2004) - [j13]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
A taxonomy of multicast data origin authentication: Issues and solutions. IEEE Commun. Surv. Tutorials 6(1-4): 34-57 (2004) - [j12]Hamida Seba, Abdelmadjid Bouabdallah, Nadjib Badache:
A new approach to scalable and fault-tolerant group key management protocols. J. High Speed Networks 13(4): 283-296 (2004) - [j11]Mahfoud Benchaïba, Abdelmadjid Bouabdallah, Nadjib Badache, Mohamed Ahmed-Nacer:
Distributed mutual exclusion algorithms in mobile ad hoc networks: an overview. ACM SIGOPS Oper. Syst. Rev. 38(1): 74-89 (2004) - [c19]Djamel Tandjaoui, Nadjib Badache, Abdelmadjid Bouabdallah:
Performance Analysis of Binding Update in Mobile IP during Handoff. HSNMC 2004: 503-511 - [c18]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
Hybrid and Adaptive Hash-Chaining Scheme for Data-Streaming Source Authentication. HSNMC 2004: 1056-1067 - [c17]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
A2cast: an adaptive source authentication protocol for multicast streams. ISCC 2004: 363-368 - [c16]Yacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard:
Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme. LCN 2004: 411-412 - [c15]Imed Romdhani, Mounir Kellil, Hong-Yon Lach, Abdelmadjid Bouabdallah, Hatem Bettahar:
Mobility-Aware Rendezvous Point for Mobile Multicast Sources. WWIC 2004: 62-73 - [c14]Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
A Scalable and Adaptive Key Management Protocol for Group Communication. WWIC 2004: 260-271 - 2003
- [j10]Hamida Seba, Abdelmadjid Bouabdallah, Nadjib Badache, Hatem Bettahar, Djamel Tandjaoui:
Gestion de clés et sécurité multipoint: étude et perspectives. Ann. des Télécommunications 58(7-8): 1090-1129 (2003) - [c13]Hamida Seba, Abdelmadjid Bouabdallah, Nadjib Badache:
Increasing the robustness of initial key agreement using failure detectors. GLOBECOM 2003: 1461-1465 - [c12]Djamel Tandjaoui, Nadjib Badache, Hatem Bettahar, Abdelmadjid Bouabdallah, Hamida Seba:
Performance Enhancement of Smooth Handoff in Mobile IP by Reducing Packets Disorder. ISCC 2003: 149-154 - [c11]Aaron Striegel, Abdelmadjid Bouabdallah, Hatem Bettahar, G. Manimaran:
EBM: A New Approach for Scalable DiffServ Multicasting. Networked Group Communication 2003: 131-142 - 2002
- [j9]Hatem Bettahar, Abdelmadjid Bouabdallah:
GMRP: problème généralisé de routage multipoint. Ann. des Télécommunications 57(9-10): 996-1012 (2002) - [j8]Hatem Bettahar, Abdelmadjid Bouabdallah:
A new approach for delay-constrained routing. Comput. Commun. 25(18): 1751-1764 (2002) - [c10]Hatem Bettahar, Abdelmadjid Bouabdallah, Yacine Challal:
AKMP: an adaptive key management protocol for secure multicast. ICCCN 2002: 190-195 - [c9]Hamida Seba, Nadjib Badache, Abdelmadjid Bouabdallah:
Solving the consensus problem in a dynamic group: an approach suitable for a mobile environment. ISCC 2002: 327-332 - 2001
- [c8]Hatem Bettahar, Abdelmadjid Bouabdallah:
QoS Routing Protocol for the Generalized Multicast Routing Problem (GMRP). ICN (1) 2001: 630-639 - [c7]Hatem Bettahar, Christophe Beaujean, Abdelmadjid Bouabdallah, Stéphane Cateloin:
A Simple Resource Reservation Protocol for Multicast Communications. ISCC 2001: 139-144 - 2000
- [j7]Abdelmadjid Bouabdallah, Christian Laforest:
A Distributed token/based Algorithm for the Dynamic Resource Allocation Problem. ACM SIGOPS Oper. Syst. Rev. 34(3): 60-68 (2000) - [c6]Sandeep K. S. Gupta, Abdelmadjid Bouabdallah, Pradip K. Srimani:
Self-Stabilizing Protocol for Shortest Path Tree for Multi-cast Routing in Mobile Networks (Research Note). Euro-Par 2000: 600-604 - [c5]Christophe Beaujean, Abdelmadjid Bouabdallah, Stéphane Cateloin:
A simple resource reservation protocol for the Internet. ICCCN 2000: 102-106
1990 – 1999
- 1999
- [c4]Hatem Bettahar, Abdelmadjid Bouabdallah:
A Scalable Multicast Protocol for Delay-Constrained Shared Multicast Tree Construction. ISCC 1999: 58-64 - [c3]Mustapha Hadim, Abdelmadjid Bouabdallah:
A Distributed Algorithm for Constructing an Eulerian Cycle in Networks. PDPTA 1999: 2200-2206 - 1998
- [j6]Abdelmadjid Bouabdallah, Marie-Claude Heydemann, Jaroslav Opatrny, Dominique Sotteau:
Embedding Complete Binary Trees Into Star and Pancake Graphs. Theory Comput. Syst. 31(3): 279-305 (1998) - 1997
- [c2]Abdelmadjid Bouabdallah, B. Hadim:
A Distributed Algorithm for Finding an Eulerian Cycle in Networks. Euro-PDS 1997: 199-202 - 1995
- [j5]Abdelmadjid Bouabdallah, Charles Delorme, Selma Djelloul:
Edge Deletion Preserving the Diameter of the Hypercube. Discret. Appl. Math. 63(1): 91-95 (1995) - 1994
- [j4]Abdelmadjid Bouabdallah:
On Mutual Exclusion in Faulty Distributed Systems. ACM SIGOPS Oper. Syst. Rev. 28(1): 80-87 (1994) - [c1]Abdelmadjid Bouabdallah, Marie-Claude Heydemann, Jaroslav Opatrny, Dominique Sotteau:
Embedding Complete Binary Trees into Star Networks. MFCS 1994: 266-275 - 1993
- [j3]Abdelmadjid Bouabdallah, Dominique Sotteau:
On the edge forwarding index problem for small graphs. Networks 23(4): 249-255 (1993) - [j2]Abdelmadjid Bouabdallah, Jean-Claude König:
An Improvement of the Maekawa's Mutual Exclusion Algorithm to Make it Fault-Tolerant. Parallel Process. Lett. 3: 305 (1993) - 1992
- [j1]Abdelmadjid Bouabdallah, Jean-Claude König:
An Improvement of Maekawa's Mutual Exclusion Algorithm to Make It Fault-Tolerant. Parallel Process. Lett. 2: 283-290 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint